JPH0451864B2 - - Google Patents

Info

Publication number
JPH0451864B2
JPH0451864B2 JP61242227A JP24222786A JPH0451864B2 JP H0451864 B2 JPH0451864 B2 JP H0451864B2 JP 61242227 A JP61242227 A JP 61242227A JP 24222786 A JP24222786 A JP 24222786A JP H0451864 B2 JPH0451864 B2 JP H0451864B2
Authority
JP
Japan
Prior art keywords
terminal
card
key
communication
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
JP61242227A
Other languages
Japanese (ja)
Other versions
JPS62120564A (en
Inventor
Jooji Aburahamu Denisu
Hooru Daburu Guren
Uiriamu Netsukiifuaroo Suchiibun
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Publication of JPS62120564A publication Critical patent/JPS62120564A/en
Publication of JPH0451864B2 publication Critical patent/JPH0451864B2/ja
Granted legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response

Description

【発明の詳細な説明】 [産業上の利用分野] 本発明は、通信システムのハードウエアまたは
構成要素を確認するための方式に関する。さらに
詳細には、本発明は、空間的に離れた場所に置か
れた構成要素または、端末装置間の暗号通信シス
テムに有効な改良に関する。
DETAILED DESCRIPTION OF THE INVENTION Field of the Invention The present invention relates to a method for verifying hardware or components of a communication system. More particularly, the present invention relates to improvements useful in encrypted communication systems between spatially separated components or terminal devices.

[従来技術および発明が解決しようとする問題
点] 端末間通信は、量が増加し、重要性も増してい
る。この通信は、資金の電子転送、商取引の場で
のクレジツトの転送など様々な目的のために行な
われる。こうしたシステムで使用量と重要性が増
出しつつある1つの構成要素は、「メモリー」カ
ードまたは「スマート」カードである。こうした
カードでは、クレジット・カードと寸法がほぼ等
しい携帯可能なユニツト上にメモリ、処理装置お
よび入出力装置が装着されている。。いわゆる
「メモリー」カードまたは「スマート」カードを
使用しているこうしたシステムの例は、米国特許
第3702464号、第4007355号および第4211919号に
示されている。
[Prior Art and Problems to be Solved by the Invention] End-to-end communications are increasing in volume and importance. This communication may occur for a variety of purposes, such as electronic transfers of funds, transfers of credits in commercial transactions, and the like. One component that is becoming increasingly used and important in such systems is the "memory" or "smart" card. These cards have memory, processing units, and input/output devices mounted on a portable unit that is approximately the same size as a credit card. . Examples of such systems using so-called "memory" or "smart" cards are shown in US Pat. Nos. 3,702,464, 4,007,355 and 4,211,919.

システムの端末間通信は、しばしば、システム
操作員の監視を受けずに実施される。この通信が
実施されるのは、少なくとも通信の一部分が、通
信機能(電話線、中継電波または人工衛星など)
を介して通信が行なわれる遠隔地で行なわれるた
め、あるいは労働力節約手段(たとえば、金銭出
納係の労働の肩代りをする銀行のロビーに設置さ
れている銀行用端末機)が利用されているためで
ある。
Communication between end-to-end systems is often conducted without the supervision of system operators. This communication is carried out because at least a portion of the communication is carried out using a communication facility (e.g. telephone line, relay radio waves or satellite).
communication is carried out in remote locations, or labor-saving measures are used (e.g., bank terminals in bank lobbies that take over the labor of tellers). It's for a reason.

通信の安全保護を確保するための様々のシステ
ムが提案されてきた。チヤレンジ・パスワード構
成を備えているものがあり、そのうちのあるもの
は、チヤレンジとして乱数を利用している。これ
らの安全保護システムは、一般に、端末が敵対的
な端末(たとえば、偽物)ではなくて友好的な端
末であると識別される以前に、有用なまたは秘密
の情報を端末に漏らしてしまう。こうした情報が
流通するようになると、おそらくは許可されてい
ない人の手でまたは許可されていない方式で操作
されている許可されていない端末がシステムに侵
入できる(たとえば他人の口座から現金を引出す
ことができる)ことになるので、(安全性の)識
別が確認される前にこうした情報を提供するのは
望ましくない。こうした安全保護システムの例は
米国特許第3798605号、第4123747号、第4193131
号、第4203166号、第4218738号、第4227253号、
第4238853号、第4238854号、第4259720号、第
4288659号、第4295039号、第4393269号、第
4423289号、第4453074号、および第4471216号に
示されている。
Various systems have been proposed to ensure the security of communications. Some have challenge password structures, some of which use random numbers as a challenge. These security systems typically leak useful or secret information to a terminal before the terminal is identified as a friendly terminal rather than a hostile terminal (eg, a fake). Once this information is in circulation, an unauthorized terminal, perhaps operated in unauthorized hands or in an unauthorized manner, can gain access to the system (e.g. withdraw cash from someone else's account). It is undesirable to provide such information before the (security) identity has been verified, as this may result in Examples of such security systems are U.S. Pat.
No. 4203166, No. 4218738, No. 4227253,
No. 4238853, No. 4238854, No. 4259720, No.
No. 4288659, No. 4295039, No. 4393269, No.
No. 4423289, No. 4453074, and No. 4471216.

[問題点を解決するための手段] 本発明は、有用な情報を伝達する前に通信シス
テムの構成要素を確実に識別ないし確認するシス
テムを設けることによつて、従来のシステムの限
界と欠点を克服するものである。この方法では、
(おそらく他の失敗に終わつた侵入の試みで得ら
れた情報と組み合せると)許可なしの認識とシス
テムへのアクセスを得るのに役立つかもしれない
情報が渡される前に、「偽物」の(許可されてい
ない)端末が識別されて、通信が停止する。
SUMMARY OF THE INVENTION The present invention overcomes the limitations and shortcomings of prior art systems by providing a system that reliably identifies or verifies components of a communication system prior to transmitting useful information. It is something to be overcome. in this way,
Before any information is passed that may help gain unauthorized recognition and access to the system (perhaps when combined with information obtained in other failed intrusion attempts), the "fake" ( (unauthorized) terminals are identified and communication is stopped.

本発明は、第1の端末のキーにもとづいて暗号
化された乱数が第2の端末にパスされる、通信チ
ヤレンジである。次に第2端末が、暗号化された
番号をそのキーを使つて解読し、キーが同一の場
合には乱数を生成する。次に、第2端末が、その
乱数の誘導形を使つてそのキーを暗号化し、第1
端末への応答を生成する。次に、第1端末が、そ
の乱数をキーとして使つて、その応答がそのキー
を暗号化したものであるかどうかを決定する。応
答がそのキーの暗号である場合、第2端末は確認
されたことになる。そうでない場合は、その端末
はよそ者または偽者であると識別され、通信は停
止される。
The present invention is a communication challenge in which a random number encrypted based on the key of a first terminal is passed to a second terminal. The second terminal then decrypts the encrypted number using the key and generates a random number if the keys are the same. The second terminal then encrypts the key using the derived form of the random number and
Generate a response to the terminal. The first terminal then uses the random number as a key to determine whether the response is an encrypted version of that key. If the response is a cipher for that key, the second terminal has been verified. If not, the terminal is identified as a stranger or imposter and communication is stopped.

[実施例] 第1図は、本発明が特に有利な環境を示したも
のである。カード10は、端末10に着脱自在に
結合される。カード10は、メモリ16にアクセ
スする処理装置14に接続された入出力要素12
を備えている。端末20は、処理装置24に接続
された入出力要素22を備えており、この処理装
置24は、記憶装置26に接続されている。さら
に、処理装置24は、キーボード27、表示装置
28、および線29を介して遠隔上位システム
(図示せず)などの外部装置に接続することがで
きる。他の型式の端末間の安全保護と確認も重要
ではあるが、カード10は、好ましくは、本明細
書の前の所で考察した本技術分野で周知の型式の
所謂「スマート」カードである。
EXAMPLE FIG. 1 illustrates an environment in which the present invention is particularly advantageous. The card 10 is detachably coupled to the terminal 10. The card 10 includes an input/output element 12 connected to a processing unit 14 that accesses a memory 16.
It is equipped with The terminal 20 comprises an input/output element 22 connected to a processing device 24, which in turn is connected to a storage device 26. Additionally, processing unit 24 may be connected to external devices such as a remote host system (not shown) via keyboard 27, display 28, and lines 29. Card 10 is preferably a so-called "smart" card of the type known in the art, discussed earlier herein, although other types of terminal-to-terminal security and verification are also important.

カード10と端末20の間で情報が交換される
前に、それぞれが相手を識別しなければならな
い。「握手」ルーチンと呼ばれる予備アクシヨン
の間に、各装置は相手の身元(アイデンテイテ
イ)を検査する。第2図に、一方の装置を他方の
装置に対して識別する方法を示す。この場合は、
カード10が端末20にチヤレンジしている。
Before information is exchanged between card 10 and terminal 20, each must identify the other. During a preliminary action called a "handshake" routine, each device verifies the identity of the other. FIG. 2 shows a method for identifying one device with respect to another. in this case,
Card 10 is challenging terminal 20.

第2図に示すように、各ユニツト(カード10
と端末20)は記憶された秘密キー、すなわちカ
ード10ではブロツク30に示すK2、端末20
ではブロツク31に示すK1を有している。カー
ドと端末が両方とも本物である場合、キーK1と
K2は同じものになる。
As shown in Figure 2, each unit (card 10
and terminal 20) are the stored private keys, i.e. K2 shown in block 30 in card 10, terminal 20).
It has K1 shown in block 31. If both the card and the terminal are genuine, the key K1 and
K2 will be the same.

カード10がチヤレンジできるようにブロツク
32で乱数RNが生成される。線が盗聴されて安
全保護が危うくなるのを避けるため、当然のこと
ながら各チヤレンジには新しい乱数を使用するこ
とが必要である。乱数RNはキーK1を使つてブロ
ツク33で暗号化され、各種規格団体と米国政府
に採用されているデータ暗号化規格(DES)な
どの安全で非可逆的な型式の暗号化方式を使つて
値Xが生成される。この値Xは、次にユニツト間
で合意された任意の通信技術を使つて、線34上
をカード10に送られる。ブロツク35で、その
秘密キーK2を使つて(参照符号e-1で示すよう
に)値Xが解読され、値Yが導かれる。当然のこ
とながらK1とK2が等しい場合には、この値Yは
乱数に等しい。次に、ブロツク36で、カードが
導かれた値Yをキーとして使つて、その秘密キー
K2の暗号化し、値Zを形成する。次に、値Zが
線37上を端末20に送り返される。ブロツク3
8で、乱数RNを使つて端末20によつて値Zが
暗号解読され、値Aが導かれる。ブロツク39
で、Aが端末のキーK1に等しいかどうかテスト
される。値AがキーK1に等しい場合は、カード
は線40で識別される。AがK1に等しくない場
合は、(キーK1とキーK2は異なつていたはずな
ので)カードは線41で認識されない。
A random number RN is generated in block 32 so that the card 10 can be challenged. It is of course necessary to use a new random number for each challenge to avoid wiretapping and compromising security. The random number RN is encrypted in block 33 using key K1, and the value is stored using a secure, irreversible type of encryption method, such as the Data Encryption Standard (DES), which has been adopted by various standards organizations and the U.S. government. X is generated. This value X is then sent over line 34 to card 10 using any communication technique agreed upon between the units. In block 35 the value Naturally, if K1 and K2 are equal, this value Y is equal to a random number. Next, in block 36, the card uses the derived value Y as a key to enter its secret key
Encrypt K2 and form the value Z. The value Z is then sent back to the terminal 20 on line 37. Block 3
At 8, the value Z is decrypted by the terminal 20 using the random number RN, and the value A is derived. block 39
, it is tested whether A is equal to the terminal key K1. If value A is equal to key K1, the card is identified by line 40. If A is not equal to K1, the card will not be recognized on line 41 (because keys K1 and K2 would have been different).

キーが正しいかどうか検査する別の実施例が第
2図に点線で示してある。ブロツク38Aで、端
末20は値Bを計算する。値Bは乱数RNをキー
として暗号化されたそのキーK1である。これは、
チヤレンジされているカードが処理されている間
に行なわれるプロセスである。計算された値B
が、ブロツク39Aで線37A上で、ブロツク3
6からの値Zと比較される。値ZとBが等しい場
合(キーK1とK2が等しいことを示す)、カード
(または他方の端末)は線40Aを介して識別さ
れる。ZがBに等しくない場合には、キーK1と
K2は異なつているはずであり、カードは線41
Aで識別されない。
Another embodiment for checking whether the key is correct is shown in dotted lines in FIG. At block 38A, terminal 20 calculates the value B. The value B is the key K1 encrypted using the random number RN as the key. this is,
This is the process that takes place while the card being challenged is being processed. calculated value B
But on line 37A at block 39A, block 3
It is compared with the value Z from 6. If the values Z and B are equal (indicating that keys K1 and K2 are equal), the card (or the other terminal) is identified via line 40A. If Z is not equal to B, the keys K1 and
K2 should be different and the card should be line 41
Not identified by A.

一方のユニツトが他方のユニツトによつて認識
された後に、第2のユニツトが、第1のユニツト
にチヤレンジされ(認識され)て、識別プロセス
が完成する。この場合は、カード10が端末20
によつて識別され、次にカード10は端末20に
チヤレンジを出して端末20を識別する。カード
で第2の乱数が生成され、それが、キーK2を使
つて暗号化され、端末20に送られる。端末20
で、キーK1を使つて暗号解読され、新しい値が
形成される。この新しい値をキーとして使つてキ
ーK1を暗号化し、それがカードに送り返される。
送り返された値を暗号解読したものが元のキーに
等しい場合、端末20は識別され通信が開始でき
る。乱数RNは後の処理のときに、たとえばセツ
シヨン・キーとして好都合に使用することができ
る。
After one unit is recognized by the other, the second unit is challenged (recognized) by the first unit to complete the identification process. In this case, card 10 is connected to terminal 20.
The card 10 then issues a challenge to the terminal 20 to identify the terminal 20. A second random number is generated on the card, which is encrypted using the key K2 and sent to the terminal 20. Terminal 20
Then, it is decrypted using key K1 to form a new value. This new value is used as a key to encrypt key K1, which is sent back to the card.
If the decrypted version of the returned value is equal to the original key, terminal 20 is identified and communication can begin. The random number RN can be advantageously used in later processing, for example as a session key.

当然のことであるが、一方の識別ができなかつ
た場合には、偽物に情報を開示して安全保護を危
険にさらすことがないように、送信プロセスが停
止する。カード10または端末20が偽物である
かもしれず、また偽物の端末または偽物のカード
は、システム全体の安全保護を危険にさらすの
で、一方が他方を識別しているというだけでは、
通信を開始するのに不十分である。
Naturally, if one party cannot be identified, the transmission process is halted to avoid compromising security by disclosing information to an impostor. Merely because one identifies the other, the card 10 or the terminal 20 may be fake, and a fake terminal or a fake card would jeopardize the security of the entire system.
Insufficient to initiate communication.

端末間で実施される認識についての議論は、通
信に関与するハードウエアの確認であり、個々の
ユーザーの識別ではない。個人識別番号や他の個
人識別法など周知の技術によつてユーザーを個別
に識別することも、多くの適用分野で望ましい。
指紋識別、署名識別など従来技術で提案されてき
た多くの方法の1つを個人識別法として実施する
ことができる。
The discussion of recognition carried out between devices is a confirmation of the hardware involved in the communication, not the identity of individual users. It is also desirable in many applications to uniquely identify users by well-known techniques such as personal identification numbers or other personal identification methods.
One of the many methods proposed in the prior art, such as fingerprint identification, signature identification, etc., can be implemented as a personal identification method.

上記の説明で記述したシステムは、本発明の精
神から逸脱することなく多くの変更を加えること
ができる。さらに、本発明のいくつかの特徴は、
それに対応する他の特徴を使用せずに単独で使用
することができる。本発明を端末とカードの間の
確認という実施例で説明してきたが、2端末間ま
たは端末と上位システム間など他の通信にも同様
に適用できる。したがつて、本発明を実施する最
良の方式の説明は、本発明の原理を限定するもの
ではなく、例示的なものにすぎない。
Many changes can be made to the system described in the above discussion without departing from the spirit of the invention. Additionally, some features of the invention include:
It can be used alone without any other features corresponding to it. Although the present invention has been described with reference to an embodiment of confirmation between a terminal and a card, it can be similarly applied to other types of communication such as between two terminals or between a terminal and a host system. Accordingly, the description of the best mode of carrying out the invention is intended to be illustrative rather than limiting on the principles of the invention.

[発明の効果] 本発明は、端末が確認されるまで、有用な情報
の提供を拒否するという有利な効果を有する。こ
の効果により、組識的な攻撃によつて、チヤレン
ジおよび受け入れ不可能な応答に関する十分な情
報を得て、より蓋然性の高い応答を生成し、最終
的にシステムへの許可なしのアクセスを得ること
が防止される。
[Effects of the Invention] The present invention has the advantageous effect of refusing to provide useful information until the terminal is verified. This effect allows a coordinated attack to obtain sufficient information about challenges and unacceptable responses to generate more probable responses and ultimately gain unauthorized access to the system. is prevented.

本発明は、さらにチヤレンジで生成され使用さ
れる乱数が完全に維持され後で端末間通信に使用
できるという利点がある。セツシヨン・キーとし
て乱数を使用すると、現在の端末間安全保護通信
システムよりも、安全保護の質が向上することが
できる。
The invention further has the advantage that the random numbers generated and used in the challenge are fully preserved and can be used later for end-to-end communication. Using random numbers as session keys can improve the quality of security over current end-to-end secure communication systems.

【図面の簡単な説明】[Brief explanation of drawings]

第1図は、本発明の安全な構成要素確認システ
ムに関連するハードウエアを例示した構成図であ
る。第2図は、有用な情報をパスせずに構成要素
が識別される、本発明の良好な実施例に関連する
処理の構成図である。 10……カード、20……端末、30……秘密
キー(K2)、31……秘密キー(K1)、32……
乱数(RN)。
FIG. 1 is a block diagram illustrating hardware related to the secure component verification system of the present invention. FIG. 2 is a block diagram of the process associated with the preferred embodiment of the present invention in which components are identified without passing any useful information. 10...Card, 20...Terminal, 30...Private key (K2), 31...Private key (K1), 32...
Random number (RN).

Claims (1)

【特許請求の範囲】 1 第1及び第2端末がそれぞれ暗号キーをも
ち、暗号キーが両者とも等しい場合に第2端末が
確認されるようにした、第1端末が第2端末を確
認する方式であつて、 前記第1端末で第1の番号を生成し、前記第1
端末の暗号キーを使つて第1の番号を暗号化する
ことにより、第2の番号を生成すること、 前記第2の番号を前記第2端末に送ること、 前記第2端末の暗号キーを使つて前記第2の番
号を暗号解読することにより、第2端末で第3の
番号を生成すること、 前記第3の番号をキーとして前記第2端末の暗
号キーを暗号化することにより、前記第2端末で
第4の番号を生成すること、 前記第4の番号を前記第1端末に送ること、 前記第1端末で、前記第1の番号をキーとして
従つて、前記第4の番号が前記第1端末の前記暗
号キーを暗号化したものと同じであることを確認
し、それにより前記第2端末を確認すること、 より成ることを特徴とする端末確認方式。
[Scope of Claims] 1. A method for the first terminal to verify the second terminal, in which the first and second terminals each have an encryption key, and the second terminal is verified when both encryption keys are equal. generating a first number at the first terminal;
generating a second number by encrypting a first number using an encryption key of a terminal; sending the second number to the second terminal; using the encryption key of the second terminal; generating a third number at the second terminal by decrypting the second number; encrypting the encryption key of the second terminal using the third number as a key; generating a fourth number at two terminals; sending the fourth number to the first terminal; using the first number as a key at the first terminal; A terminal confirmation method comprising: confirming that the encryption key of the first terminal is the same as the encrypted one, and thereby confirming the second terminal.
JP61242227A 1985-11-18 1986-10-14 Terminal checking system Granted JPS62120564A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US799367 1985-11-18
US06/799,367 US4799061A (en) 1985-11-18 1985-11-18 Secure component authentication system

Publications (2)

Publication Number Publication Date
JPS62120564A JPS62120564A (en) 1987-06-01
JPH0451864B2 true JPH0451864B2 (en) 1992-08-20

Family

ID=25175720

Family Applications (1)

Application Number Title Priority Date Filing Date
JP61242227A Granted JPS62120564A (en) 1985-11-18 1986-10-14 Terminal checking system

Country Status (4)

Country Link
US (1) US4799061A (en)
EP (1) EP0223122B1 (en)
JP (1) JPS62120564A (en)
DE (1) DE3688316T2 (en)

Families Citing this family (110)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2173738B (en) * 1985-04-19 1989-07-12 Roneo Alcatel Ltd Secure transport of information between electronic stations
FR2600189B1 (en) * 1986-06-16 1991-02-01 Bull Cp8 PROCESS FOR AUTHENTICATING BY AN EXTERNAL ENVIRONMENT A PORTABLE OBJECT SUCH AS A MEMORY CARD COUPLED TO THIS ENVIRONMENT
JPH07104891B2 (en) * 1986-08-05 1995-11-13 沖電気工業株式会社 Transaction processor
EP0257585B1 (en) * 1986-08-22 1992-11-25 Nec Corporation Key distribution method
JPS6457531U (en) * 1987-10-05 1989-04-10
JP2555096B2 (en) * 1987-10-05 1996-11-20 富士通株式会社 IC card
US4885789A (en) * 1988-02-01 1989-12-05 International Business Machines Corporation Remote trusted path mechanism for telnet
WO1989008887A1 (en) * 1988-03-11 1989-09-21 Qpsx Communications Ltd. Access security system for switched communications networks
CH694306A5 (en) * 1988-04-11 2004-11-15 Syspatronic Ag Spa Chip card.
US4969189A (en) * 1988-06-25 1990-11-06 Nippon Telegraph & Telephone Corporation Authentication system and apparatus therefor
US4961142A (en) * 1988-06-29 1990-10-02 Mastercard International, Inc. Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer
EP0403656B1 (en) * 1988-07-13 1995-05-24 Matsushita Electric Industrial Co., Ltd. Communication equipment
JP2831658B2 (en) * 1988-07-22 1998-12-02 株式会社東芝 Lock release method
JPH02100164A (en) * 1988-10-07 1990-04-12 Toppan Printing Co Ltd Ic card device
CA1326304C (en) * 1989-01-17 1994-01-18 Marcel Graves Secure data interchange system
US5293029A (en) * 1989-01-17 1994-03-08 Kabushiki Kaisha Toshiba System for mutually certifying an IC card and an IC card terminal
ATE99096T1 (en) * 1989-03-08 1994-01-15 Siemens Nixdorf Inf Syst METHOD OF GENERATION OF A RANDOM NUMBER FOR THE ENCRYPTED TRANSMISSION OF DATA.
US4932056A (en) * 1989-03-16 1990-06-05 Yeda Research And Development Company Limited Method and apparatus for user identification based on permuted kernels
FR2658375B2 (en) * 1989-05-25 1994-04-22 Adventure ELECTRONIC DEVICE FOR ALLOWING INDIVIDUAL PARTICIPATION IN A BROADCASTING PROGRAM.
US5148481A (en) * 1989-10-06 1992-09-15 International Business Machines Corporation Transaction system security method and apparatus
EP0440158B1 (en) * 1990-01-30 1997-09-10 Kabushiki Kaisha Toshiba Mutual authentication system
US6507909B1 (en) * 1990-02-13 2003-01-14 Compaq Information Technologies Group, L.P. Method for executing trusted-path commands
DE4008971A1 (en) * 1990-03-20 1991-09-26 Siemens Nixdorf Inf Syst METHOD FOR AUTHENTICATING A USER USING A DATA STATION
US5036461A (en) * 1990-05-16 1991-07-30 Elliott John C Two-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device
US6175312B1 (en) 1990-05-29 2001-01-16 Microchip Technology Incorporated Encoder and decoder microchips and remote control devices for secure unidirectional communication
US5196840A (en) * 1990-11-05 1993-03-23 International Business Machines Corporation Secure communications system for remotely located computers
JP3114991B2 (en) * 1990-11-30 2000-12-04 株式会社東芝 Data communication system
US5144667A (en) * 1990-12-20 1992-09-01 Delco Electronics Corporation Method of secure remote access
EP0520709A3 (en) * 1991-06-28 1994-08-24 Digital Equipment Corp A method for providing a security facility for remote systems management
JP3083187B2 (en) * 1991-09-30 2000-09-04 富士通株式会社 Key management method of electronic wallet system
NL9101796A (en) * 1991-10-25 1993-05-17 Nederland Ptt METHOD FOR AUTHENTICATING COMMUNICATION PARTICIPANTS, METHOD FOR USING THE METHOD AND FIRST COMMUNICATION PARTICIPANT AND SECOND COMMUNICATION PARTICIPANT FOR USE IN THE SYSTEM.
FR2686170B1 (en) * 1992-01-14 1996-09-06 Gemplus Card Int MASS MEMORY CARD FOR MICROCOMPUTER.
EP0566811A1 (en) * 1992-04-23 1993-10-27 International Business Machines Corporation Authentication method and system with a smartcard
JP2973723B2 (en) * 1992-07-30 1999-11-08 日本電気株式会社 Subscriber information setting method for mobile phones
US5267314A (en) * 1992-11-17 1993-11-30 Leon Stambler Secure transaction system and method utilized therein
US5491752A (en) * 1993-03-18 1996-02-13 Digital Equipment Corporation, Patent Law Group System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authentication tokens
DE4317380C1 (en) * 1993-05-25 1994-08-18 Siemens Ag Method for authentication between two electronic devices
WO1995014283A2 (en) * 1993-11-08 1995-05-26 Hughes Aircraft Company Protected distribution protocol for keying and certificate material
IL107789A0 (en) * 1993-11-29 1995-03-15 Cortress U & T Ltd Data verification system and method
US5491749A (en) * 1993-12-30 1996-02-13 International Business Machines Corporation Method and apparatus for entity authentication and key distribution secure against off-line adversarial attacks
US5491750A (en) * 1993-12-30 1996-02-13 International Business Machines Corporation Method and apparatus for three-party entity authentication and key distribution using message authentication codes
US5488649A (en) * 1994-05-06 1996-01-30 Motorola, Inc. Method for validating a communication link
US5475756A (en) * 1994-02-17 1995-12-12 At&T Corp. Method of authenticating a terminal in a transaction execution system
US5509071A (en) * 1994-04-01 1996-04-16 Microelectronics And Computer Technology Corporation Electronic proof of receipt
US5598475A (en) * 1995-03-23 1997-01-28 Texas Instruments Incorporated Rolling code identification scheme for remote control applications
JPH08305662A (en) * 1995-05-02 1996-11-22 Fujitsu Ltd Method and system for client authentication
NL1001376C2 (en) * 1995-05-11 1996-11-12 Nederland Ptt Method for executing an electronic payment transaction with a variable number of payment units, as well as payment means and system for applying the method.
WO1996037063A1 (en) * 1995-05-17 1996-11-21 The Chamberlain Group, Inc. Rolling code security system
US6690796B1 (en) 1995-05-17 2004-02-10 The Chamberlain Group, Inc. Rolling code security system
US7492905B2 (en) 1995-05-17 2009-02-17 The Chamberlain Group, Inc. Rolling code security system
US6980655B2 (en) 2000-01-21 2005-12-27 The Chamberlain Group, Inc. Rolling code security system
US6157831A (en) * 1997-01-11 2000-12-05 Compaq Computer Corp. Method and apparatus for implementing configurable call forwarding bins in a mobile telephone system
WO1998031164A2 (en) 1997-01-11 1998-07-16 Tandem Computers, Incorporated Method and apparatus for configuration of authentication center operations allowed by system access type in a mobile telephone system
US6085083A (en) * 1997-01-11 2000-07-04 Tandem Computers, Inc. Method and apparatus for providing fraud protection mediation in a mobile telephone system
JPH10222618A (en) * 1997-01-31 1998-08-21 Toshiba Corp Ic card and ic card processing system
AUPO799197A0 (en) * 1997-07-15 1997-08-07 Silverbrook Research Pty Ltd Image processing method and apparatus (ART01)
JP3864401B2 (en) * 1997-04-23 2006-12-27 ソニー株式会社 Authentication system, electronic device, authentication method, and recording medium
US6097939A (en) * 1997-07-11 2000-08-01 Compaq Computer Corporation Method and apparatus for event data maintenance per MIN/ESN pair in a mobile telephone system
US7743262B2 (en) * 1997-07-15 2010-06-22 Silverbrook Research Pty Ltd Integrated circuit incorporating protection from power supply attacks
US7246098B1 (en) * 1997-07-15 2007-07-17 Silverbrook Research Pty Ltd Consumable authentication protocol and system
US7249108B1 (en) * 1997-07-15 2007-07-24 Silverbrook Research Pty Ltd Validation protocol and system
US7346586B1 (en) 1997-07-15 2008-03-18 Silverbrook Research Pty Ltd Validation protocol and system
US6081600A (en) * 1997-10-03 2000-06-27 Motorola, Inc. Method and apparatus for signaling privacy in personal communications systems
JP3565715B2 (en) 1998-07-02 2004-09-15 松下電器産業株式会社 Broadcast system and broadcast transceiver
US6816968B1 (en) * 1998-07-10 2004-11-09 Silverbrook Research Pty Ltd Consumable authentication protocol and system
JP4427693B2 (en) * 1998-10-02 2010-03-10 ソニー株式会社 Data processing apparatus and method, and data decoding processing apparatus and method
EP1026641B1 (en) * 1999-02-01 2013-04-24 International Business Machines Corporation Method and system for establishing a trustworthy connection between a user and a terminal
US6532290B1 (en) 1999-02-26 2003-03-11 Ericsson Inc. Authentication methods
US6304969B1 (en) * 1999-03-16 2001-10-16 Webiv Networks, Inc. Verification of server authorization to provide network resources
US7310735B1 (en) * 1999-10-01 2007-12-18 International Business Machines Corporation Method, system, and program for distributing software between computer systems
DE60026186T2 (en) * 2000-01-26 2006-11-16 Em Microelectronic-Marin S.A., Marin Method of testing an integrated circuit with confidential software or hardware elements
US7685423B1 (en) 2000-02-15 2010-03-23 Silverbrook Research Pty Ltd Validation protocol and system
EP1260053B1 (en) * 2000-02-15 2006-05-31 Silverbrook Research Pty. Limited Consumable authentication protocol and system
AU2006252272B2 (en) * 2000-02-15 2007-03-22 Silverbrook Research Pty Ltd An apparatus for validating a device using first and second keys
JP2001265361A (en) * 2000-03-14 2001-09-28 Sony Corp Device and method for providing information, device and method for providing information, and program storage medium
SE517460C2 (en) * 2000-03-24 2002-06-11 Imp Internat Ab Method and system for encryption and authentication
JP3927761B2 (en) * 2000-07-31 2007-06-13 株式会社ソニー・コンピュータエンタテインメント Electronic device communication system and electronic device communication method
KR100405757B1 (en) * 2000-10-20 2003-11-14 블루솔텍(주) Control system for door and indoor appliances by using radio communication
US6769060B1 (en) 2000-10-25 2004-07-27 Ericsson Inc. Method of bilateral identity authentication
FR2823928B1 (en) * 2001-04-19 2003-08-22 Canal Plus Technologies METHOD FOR SECURE COMMUNICATION BETWEEN TWO DEVICES
FI114180B (en) * 2001-06-12 2004-08-31 Nokia Corp Improved method and device arrangement for encrypting data transmission at the interface of the radio network terminal equipment and such terminal equipment
US7003111B2 (en) * 2001-10-11 2006-02-21 International Business Machines Corporation Method, system, and program, for encoding and decoding input data
US7865440B2 (en) * 2001-10-11 2011-01-04 International Business Machines Corporation Method, system, and program for securely providing keys to encode and decode data in a storage cartridge
US20040019791A1 (en) * 2002-07-24 2004-01-29 Congruence, Llc Code for object identification
US20050005136A1 (en) * 2003-04-23 2005-01-06 Liqun Chen Security method and apparatus using biometric data
GB0309182D0 (en) 2003-04-23 2003-05-28 Hewlett Packard Development Co Security method and apparatus using biometric data
US7240995B2 (en) * 2003-05-06 2007-07-10 Lexmark International, Inc. Method of authenticating a consumable
US8165297B2 (en) * 2003-11-21 2012-04-24 Finisar Corporation Transceiver with controller for authentication
US20070168674A1 (en) * 2003-12-09 2007-07-19 Masao Nonaka Authentication system, authentication apparatus, and recording medium
JP2005318528A (en) * 2004-03-29 2005-11-10 Sanyo Electric Co Ltd Radio transmission device, mutual authentication method and mutual authentication program
US8099791B1 (en) 2004-06-25 2012-01-17 Lexmark International, Inc. Method of authenticating a consumable in an imaging device
US9148409B2 (en) 2005-06-30 2015-09-29 The Chamberlain Group, Inc. Method and apparatus to facilitate message transmission and reception using different transmission characteristics
US8422667B2 (en) 2005-01-27 2013-04-16 The Chamberlain Group, Inc. Method and apparatus to facilitate transmission of an encrypted rolling code
EP1688889B1 (en) * 2005-02-04 2017-06-21 SMARTRAC TECHNOLOGY Wehnrath GmbH Method for communicating and checking authentication data between a portable transponder device and a vehicle reader unit
EP1688888A1 (en) * 2005-02-04 2006-08-09 Sokymat Automotive GmbH Method for communication and verification of authentication data between a portable device with transponder and a vehicle reading unit
JP4899691B2 (en) * 2006-07-28 2012-03-21 富士ゼロックス株式会社 Authenticator true / false judgment system, identification system and interrogator
GB2441409A (en) * 2006-08-03 2008-03-05 Sepura Ltd Method of registering an entity
US8762714B2 (en) * 2007-04-24 2014-06-24 Finisar Corporation Protecting against counterfeit electronics devices
US9148286B2 (en) * 2007-10-15 2015-09-29 Finisar Corporation Protecting against counterfeit electronic devices
US20090240945A1 (en) * 2007-11-02 2009-09-24 Finisar Corporation Anticounterfeiting means for optical communication components
US20090119221A1 (en) * 2007-11-05 2009-05-07 Timothy Martin Weston System and Method for Cryptographically Authenticated Display Prompt Control for Multifunctional Payment Terminals
US8819423B2 (en) * 2007-11-27 2014-08-26 Finisar Corporation Optical transceiver with vendor authentication
US8583942B2 (en) 2011-02-04 2013-11-12 Cypress Semiconductor Corporation Authenticating ferroelectric random access memory (F-RAM) device and method
US20130342314A1 (en) * 2012-06-22 2013-12-26 Gun Chen Smart lock structure and operating method thereof
KR101834504B1 (en) * 2016-01-15 2018-03-06 단국대학교 산학협력단 Apparatus and method for encrypting and decrypting
KR101834522B1 (en) 2016-04-22 2018-03-06 단국대학교 산학협력단 Apparatus for confirming data and method for confirming data using the same
US10652743B2 (en) 2017-12-21 2020-05-12 The Chamberlain Group, Inc. Security system for a moveable barrier operator
US11074773B1 (en) 2018-06-27 2021-07-27 The Chamberlain Group, Inc. Network-based control of movable barrier operators for autonomous vehicles
WO2020028502A1 (en) 2018-08-01 2020-02-06 The Chamberlain Group, Inc. Movable barrier operator and transmitter pairing over a network
US10997810B2 (en) 2019-05-16 2021-05-04 The Chamberlain Group, Inc. In-vehicle transmitter training

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2401459A1 (en) * 1977-08-26 1979-03-23 Cii Honeywell Bull PORTABLE INFORMATION MEDIA EQUIPPED WITH A MICROPROCESSOR AND A PROGRAMMABLE DEAD MEMORY
US4193131A (en) * 1977-12-05 1980-03-11 International Business Machines Corporation Cryptographic verification of operational keys used in communication networks
US4227253A (en) * 1977-12-05 1980-10-07 International Business Machines Corporation Cryptographic communication security for multiple domain networks
US4238854A (en) * 1977-12-05 1980-12-09 International Business Machines Corporation Cryptographic file security for single domain networks
US4203166A (en) * 1977-12-05 1980-05-13 International Business Machines Corporation Cryptographic file security for multiple domain networks
US4238853A (en) * 1977-12-05 1980-12-09 International Business Machines Corporation Cryptographic communication security for single domain networks
US4259720A (en) * 1978-01-09 1981-03-31 Interbank Card Association Security system for electronic funds transfer system
US4218738A (en) * 1978-05-05 1980-08-19 International Business Machines Corporation Method for authenticating the identity of a user of an information system
US4349695A (en) * 1979-06-25 1982-09-14 Datotek, Inc. Recipient and message authentication method and system
FR2469760A1 (en) * 1979-11-09 1981-05-22 Cii Honeywell Bull METHOD AND SYSTEM FOR IDENTIFYING PEOPLE REQUESTING ACCESS TO CERTAIN MEDIA
US4295039A (en) * 1979-12-03 1981-10-13 International Business Machines Corporation Method and apparatus for achieving secure password verification
FR2480539B1 (en) * 1980-04-09 1985-09-13 Cii Honeywell Bull METHOD AND SYSTEM FOR TRANSMITTING SIGNED MESSAGES
US4393269A (en) * 1981-01-29 1983-07-12 International Business Machines Corporation Method and apparatus incorporating a one-way sequence for transaction and identity verification
SE426128B (en) * 1981-04-08 1982-12-06 Philips Svenska Ab METHOD FOR TRANSFER OF DATA MESSAGES BETWEEN TWO STATIONS, AND TRANSFER PLANT FOR EXECUTING THE METHOD
US4453074A (en) * 1981-10-19 1984-06-05 American Express Company Protection system for intelligent cards
NL8201077A (en) * 1982-03-16 1983-10-17 Philips Nv A COMMUNICATION SYSTEM, CONTAINING A CENTRAL DATA PROCESSING DEVICE, ACCESS STATIONS AND EXTERNAL STATIONS, WHICH A CRYPTOGRAPHIC CHECK IS FORDICULARIZING AN EXTERNAL STATION, AND EXTERNAL STATIONS FOR USE IN SUCH A COMMUNITY.
FR2530053B1 (en) * 1982-07-08 1986-04-25 Bull Sa METHOD FOR CERTIFYING THE SOURCE OF AT LEAST ONE INFORMATION RECORDED IN A MEMORY OF A FIRST ELECTRONIC DEVICE AND TRANSMITTED TO A SECOND ELECTRONIC DEVICE, AND SYSTEM FOR IMPLEMENTING SUCH A METHOD
US4536647A (en) * 1983-07-15 1985-08-20 Atalla Corporation Pocket banking terminal, method and system
FR2549989B1 (en) * 1983-07-29 1985-09-13 Philips Ind Commerciale AUTHENTICATION SYSTEM BETWEEN A CARD READER AND A PAYMENT CARD EXCHANGING INFORMATION

Also Published As

Publication number Publication date
DE3688316T2 (en) 1993-10-28
DE3688316D1 (en) 1993-05-27
EP0223122A2 (en) 1987-05-27
EP0223122A3 (en) 1989-04-05
US4799061A (en) 1989-01-17
JPS62120564A (en) 1987-06-01
EP0223122B1 (en) 1993-04-21

Similar Documents

Publication Publication Date Title
JPH0451864B2 (en)
US11824991B2 (en) Securing transactions with a blockchain network
US9900163B2 (en) Facilitating secure online transactions
US6189098B1 (en) Client/server protocol for proving authenticity
US5546463A (en) Pocket encrypting and authenticating communications device
US20180144114A1 (en) Securing Blockchain Transactions Against Cyberattacks
EP0043027B1 (en) Electronic signature verification method and system
US5343529A (en) Transaction authentication using a centrally generated transaction identifier
US7409552B2 (en) Method for securing communications between a terminal and an additional user equipment
CN109325342A (en) Identity information management method, apparatus, computer equipment and storage medium
JP2000502532A (en) Application level security system and method
JPS6310839A (en) System and method for data communication
CN109379189A (en) Block chain account cipher key backup and restoration methods, device, terminal and system
US20140258718A1 (en) Method and system for secure transmission of biometric data
JPH0575598A (en) Key data sharing device
CN108401494B (en) Method and system for transmitting data
CN113364597A (en) Privacy information proving method and system based on block chain
CN108667801A (en) A kind of Internet of Things access identity safety certifying method and system
WO2008039227A1 (en) System and method for facilitating secure online transactions
CN111541708B (en) Identity authentication method based on power distribution
Nashwan et al. Mutual chain authentication protocol for SPAN transactions in Saudi Arabian banking
JPH0199158A (en) Terminal authorizing method
CN113660089A (en) Tax payment user identity authentication method and device based on block chain
US20200026881A1 (en) Systems and methods for performing authentication
Pricope Hardware and Software Technologies used in the Financial Industry